Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
tiago.exe

Overview

General Information

Sample name:tiago.exe
Analysis ID:1390958
MD5:41b99b0770f01afbd80481fb6f811bcc
SHA1:58ee2fb1672b3af2db7997bb91cf3ab138d801e1
SHA256:d457b15dfcdd6669d60af6d96f56757674b6f0fbba11999f76f47e03bd635d09
Tags:exe
Infos:

Detection

Reverse SSH
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Outlook Reverse SSH
PE file contains sections with non-standard names
Potential time zone aware malware
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Tries to load missing DLLs

Classification

  • System is w10x64
  • tiago.exe (PID: 6804 cmdline: C:\Users\user\Desktop\tiago.exe MD5: 41B99B0770F01AFBD80481FB6F811BCC)
    • conhost.exe (PID: 6056 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
tiago.exeJoeSecurity_ReverseSSHYara detected Outlook Reverse SSHJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.1237510418.0000000000D7A000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_ReverseSSHYara detected Outlook Reverse SSHJoe Security
      00000000.00000002.2489434623.0000000000D7A000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_ReverseSSHYara detected Outlook Reverse SSHJoe Security
        Process Memory Space: tiago.exe PID: 6804JoeSecurity_ReverseSSHYara detected Outlook Reverse SSHJoe Security
          SourceRuleDescriptionAuthorStrings
          0.0.tiago.exe.560000.0.unpackJoeSecurity_ReverseSSHYara detected Outlook Reverse SSHJoe Security
            0.2.tiago.exe.560000.0.unpackJoeSecurity_ReverseSSHYara detected Outlook Reverse SSHJoe Security
              No Sigma rule has matched
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: tiago.exeAvira: detected
              Source: tiago.exeReversingLabs: Detection: 23%
              Source: tiago.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: Binary string: C:\rprichard\proj\winpty\src\Release\x64\winpty.pdb source: tiago.exe
              Source: Binary string: C:\rprichard\proj\winpty\src\Release\x64\winpty-agent.pdb source: tiago.exe
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.129
              Source: C:\Users\user\Desktop\tiago.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\tiago.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\tiago.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\tiago.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\Users\user\Desktop\tiago.exeSection loaded: umpdc.dllJump to behavior
              Source: C:\Users\user\Desktop\tiago.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\tiago.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\tiago.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Users\user\Desktop\tiago.exeSection loaded: wkscli.dllJump to behavior
              Source: C:\Users\user\Desktop\tiago.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\tiago.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Users\user\Desktop\tiago.exeSection loaded: samlib.dllJump to behavior
              Source: C:\Users\user\Desktop\tiago.exeSection loaded: mswsock.dllJump to behavior
              Source: classification engineClassification label: mal64.troj.winEXE@2/1@0/1
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6056:120:WilError_03
              Source: C:\Users\user\Desktop\tiago.exeFile opened: C:\Windows\system32\92ce28ff278bbce557f6d63a6e428624a84c1480dafc1d81a65ca01fa2e182b5AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJump to behavior
              Source: tiago.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\tiago.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: tiago.exeReversingLabs: Detection: 23%
              Source: tiago.exeString found in binary or memory: text= via %s zombie% CPU (, goid=, j0 = -NoLogo19531252.5.4.32.5.4.52.5.4.62.5.4.72.5.4.82.5.4.99765625: type ::ffff::method:scheme:statusACK badAddressAvestanBengaliBrailleCLOSINGCONNECTChanDirCopySidCreatedCypriotDeseretDstMaskEd25519ElbasanElymaicEnabledExpiresFATAL: ForkingFreeSidGODEBUGGranthaHEADERSHanunooHighRxtIM UsedINITIALIO waitJanuaryKannadaMD2-RSAMD5-RSAMUI_DltMUI_StdMakasarMandaicMarchenMaxCwndMaxSizeMultaniMyanmarNextHopNoRouteOctoberOsmanyaPATHEXTPayloadPktTypeRadicalRefererSHA-224SHA-256SHA-384SHA-512SegTimeSharadaShavianSiddhamSinhalaSleepExSndCwndSockErrSogdianSoyomboSrcMaskSubjectSwapperTagalogTibetanTimeoutTirhutaTrailerTuesdayTypeALLTypeOPTTypePTRTypeSOATypeSRVTypeTXTTypeWKSUNKNOWNUnknownUpgradeWARNINGWSARecvWSASendWarning\\.\UNCtypes value=abortedanswersarcfouravx512fbucketscharsetchtimeschunkedcmd.execommandconnectconsolecpuprofderiveddstAddrexpiresfailurefloat32float64forcegcgctracehandlerhead = headershttp://installinvalidipv4TOSipv4TTLlookup minpc= nil keyoptionsosxsavepacer: panic: rcvListreaddirrefererrefreshregularrssh://runningsendTOSserial:servicesessionsignal srcAddrssh-dssssh-rsasshtypesymlinksyscalltrailertupleIDuintptrunackedunknownupgradeusage: userMSSwaitingwindowswriteatwsarecvwsasendx64/xp/ bytes, data=%q etypes incr=%v is not maxpc= mcount= minLC= minutes nalloc= newval= nfreed= packed= ping=%q pointer stack=[ status %!Month(2.5.4.102.5.4.112.5.4.173des-cbc48828125AcceptExAcceptedArmenianAssignedBAD RANKBalineseBindAddrBopomofoBugineseCancelIoCherokeeClassANYConflictContinueCtrl + CCtrl + DCurveID(CyrillicDNS nameDSA-SHA1DecemberDenyTypeDisabledDuployanEqualSidEthiopicExtenderFebruaryFullPathGeorgianGoStringGujaratiGurmukhiHTTP/1.1HTTP/2.0HiraganaHopLimitHost: %sIsWindowJavaneseKatakanaKayah_LiL3HdrLenLAST-ACKLinear_ALinear_BLinkAddrLocationMD5+SHA1MahajaniMatchersNO_ERRORNO_PROXYNetProtoNovemberOffenderOl_ChikiOrigin: PRIORITYParseIntPhags_PaProtocolQuestionRTTStateReadFileReceivedReceiverRecentTSSETTINGSSHA1-RSASHA3-224SHA3-256SHA3-384SHA3-512SYN-RCVDSYN-SENTSaturdaySendTSOkSetEventSsthreshTSOffsetTagbanwaTai_ThamTai_VietThursdayTifinaghTimeoutsTypeAAAATypeAXFRUgariticWLastMaxWSAIoctlXmitTime[::1]:53[:word:][signal stack=[_gatewayacceptexaddress argumentavx512bwavx512cdavx512dqavx512eravx512pfavx512vlboundNICcapacitycgocheckconsumedcontinuecs deadlockdnatDoneerrQueueexecwaitexporterfile+netfinishedfs gs hijackedhost keyhttp/1.1if-matchif-rangeintervalinvalid ip4:icmplastUsedlistenEPlocationloopbackmodifiednetProtonistp256nistp384nistp521no anodeno-cacheno_proxyoriginalpasswordphoturispollDescr10 r11 r12 r13 r14 r15 r8 r9 rax rbp rbx rcvQueuercvReadyrcvdTimercvlowatrcx rdi readfromreadlinkrecvfromredirectrefCountreservedrflags rip rsi rsp runnablerwmutexRrwmutexWscavengeshutdownsnatDonestrconv.traceBuftrigger=truncateuniqueIDunixgramunknown(v4Tablesv6TableswasBoundwsaioctlx509sha1xmitTime (forced) -> node= B exp.)
              Source: tiago.exeString found in binary or memory: %s\.+*?()|[]{}^$accept-charsetallocfreetracebad allocCountbad record MACbad restart PCbad span stateboundPortFlagschannelDataMsgchannelOpenMsgconnect failedcontent-lengthdata truncatedexitedRecoveryfile too largefinalizeResultfinalizer waitgcstoptheworldgetprotobynamehasNewSACKInfointernal errorinvalid optioninvalid syntaxis a directorylevel 2 haltedlevel 3 haltedmulticastNICIDmultipartfilesneed more datanil elem type!no module datano such devicepacket too bigport is in usepowershell.exeprotocol errorrawPacketEntryread_frame_eofruntime: full=runtime: want=s.allocCount= semaRoot queuesendBufferSizesequenceNumbersockErrorEntrysource-addressssh-connectionstack overflowstopm spinningstore64 failedsync.Cond.Waittext file busytoo many linkstoo many usersudpPacketEntryunexpected EOFunknown code: unknown deviceunknown error unknown methodunknown mode: unknown nic idunreachable: unsafe.PointeruserArenaStatewinapi error #work.full != 0zero parameter with GC prog
              Source: tiago.exeString found in binary or memory: span set block with unpopped elements found in resetssh: error parsing source-address restriction %q: %vssh: peer's curve25519 public value has wrong lengthssh: unexpected message type %d (expected one of %v)tls: received a session ticket with invalid lifetimetls: server selected unsupported protocol version %xunrecognized result from DeliverTransportPacket = %dwebsocket: cannot set deadline: not using a net.Connx509: cannot verify signature: insecure algorithm %vUnderflows should only return RuleAccept or RuleDrop.--nameName of service to act on, defaults to 'rssh'cannot create a route with NICs from different stackschacha20: internal error: wrong dst and/or src lengthcompileCallback: argument size is larger than uintptrcrypto/ecdh: internal error: mismatched isLess inputscrypto/elliptic: attempted operation on invalid pointhttp2: Framer %p: failed to decode just-written framehttp2: Transport failed to get client conn for %s: %vhttp: putIdleConn: too many idle connections for hostillegal use of AllowIllegalReads with ReadMetaHeadersndpdad: already performing DAD for addr %s on NIC(%d)pem: cannot encode a header key that contains a colonreflect.Value.Slice: string slice index out of boundsssh: server-generated gex p is out of range (%d bits)tls: HKDF-Expand-Label invocation failed unexpectedlytls: received unexpected handshake message of type %Tunable to run with conpty, falling back to winpty: %vunexpected error when reading domain name's label: %sx509: certificate specifies an incompatible key usageSYSTEM\CurrentControlSet\Services\EventLog\ApplicationURI with IP (%q) cannot be matched against constraintsgoroutine running on other thread; stack unavailable
              Source: tiago.exeString found in binary or memory: Unexpected entry in leak checking map: reference %p already added--fingerprintServer public key SHA256 hex fingerprint for authconflicting primitiveTypeDatabase entry for %T: used by primitivecryptobyte: pending child length %d exceeds %d-byte length prefixfound unknown destination header option = %#v with discard actionndp: must have a tempAddr entry to deprecate temporary address %snet/http: Transport.DialTLS or DialTLSContext returned (nil, nil)nistec: internal error: p224Table called with out-of-bounds valuenistec: internal error: p384Table called with out-of-bounds valuenistec: internal error: p521Table called with out-of-bounds valuepkg/tcpip/network/ipv4.icmpv4DestinationProtoUnreachableSockErrorruntime.SetFinalizer: pointer not at beginning of allocated blocktls: server selected an invalid version after a HelloRetryRequestunexpected error when informing NIC of neighbor probe message: %suser arena chunk size is not a mutliple of the physical page sizex509: inner and outer signature algorithm identifiers don't matchx509: issuer name does not match subject from issuing certificateDHCPv6NoConfigurationDHCPv6ManagedAddressDHCPv6OtherConfigurationsUnable to unmarshal remote forward request in order to stop it: %scryptobyte: high-tag number identifier octects not supported: 0x%xndp: must have a tempAddr entry to clean up temp addr %s resourcesndp: must have a tempAddr entry to invalidate temporary address %stls: certificate private key (%T) does not implement crypto.Signerunable to query buffer size from InitializeProcThreadAttributeListunexpected error when reading the option's Length field for %s: %sunexpected error writing trailing period to domain name buffer: %svirtioNetHeaderlinkHeadernetworkHeadertransportHeadernumHeaderTypex509: certificate is not valid for any names, but wanted to match -d or --destinationServer connect back address (can be baked in)copied %d bytes in the replacement option buffer, expected %d bytesfailed to increment reference count for local address endpoint = %spkg/tcpip/network/internal/ip.ErrNoMulticastPendingQueueBufferSpacepkg/tcpip/network/ipv6.icmpv6DestinationAddressUnreachableSockErrorpkg/tcpip/network/ipv6.icmpv6DestinationNetworkUnreachableSockErrorssh: no address known for client, but source-address match requiredtls: server sent certificate containing RSA key larger than %d bits2695994666715063979466701508701962594045780771442439172168272236806126959946667150639794667015087019630673557916260026308143510066298881crypto/hmac: hash generation function does not produce unique valuesgo package net: built with netgo build tag; using Go's DNS resolver
              Source: tiago.exeString found in binary or memory: net/addrselect.go
              Source: tiago.exeString found in binary or memory: golang.org/x/sys@v0.8.0/windows/svc/eventlog/install.go
              Source: tiago.exeString found in binary or memory: gvisor.dev/gvisor@v0.0.0-20230610041700-6b8dbbf6f6fb/pkg/state/addr_set.go
              Source: tiago.exeString found in binary or memory: gvisor.dev/gvisor@v0.0.0-20230610041700-6b8dbbf6f6fb/pkg/tcpip/stack/address_state_mutex.go
              Source: tiago.exeString found in binary or memory: gvisor.dev/gvisor@v0.0.0-20230610041700-6b8dbbf6f6fb/pkg/tcpip/stack/address_state_refs.go
              Source: tiago.exeString found in binary or memory: gvisor.dev/gvisor@v0.0.0-20230610041700-6b8dbbf6f6fb/pkg/tcpip/stack/addressable_endpoint_state.go
              Source: tiago.exeString found in binary or memory: gvisor.dev/gvisor@v0.0.0-20230610041700-6b8dbbf6f6fb/pkg/tcpip/stack/addressable_endpoint_state_mutex.go
              Source: unknownProcess created: C:\Users\user\Desktop\tiago.exe C:\Users\user\Desktop\tiago.exe
              Source: C:\Users\user\Desktop\tiago.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: tiago.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
              Source: tiago.exeStatic file information: File size 11424768 > 1048576
              Source: tiago.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x3cca00
              Source: tiago.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x6c4800
              Source: tiago.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: Binary string: C:\rprichard\proj\winpty\src\Release\x64\winpty.pdb source: tiago.exe
              Source: Binary string: C:\rprichard\proj\winpty\src\Release\x64\winpty-agent.pdb source: tiago.exe
              Source: tiago.exeStatic PE information: section name: .symtab
              Source: C:\Users\user\Desktop\tiago.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tiago.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\tiago.exeSystem information queried: CurrentTimeZoneInformationJump to behavior
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: tiago.exe, 00000000.00000002.2495116429.0000022EC07DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\Desktop\tiago.exeProcess information queried: ProcessInformationJump to behavior
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: tiago.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.tiago.exe.560000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.tiago.exe.560000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1237510418.0000000000D7A000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2489434623.0000000000D7A000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: tiago.exe PID: 6804, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: tiago.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.tiago.exe.560000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.tiago.exe.560000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1237510418.0000000000D7A000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2489434623.0000000000D7A000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: tiago.exe PID: 6804, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
              Command and Scripting Interpreter
              1
              DLL Side-Loading
              1
              Process Injection
              1
              Process Injection
              OS Credential Dumping1
              System Time Discovery
              Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
              DLL Side-Loading
              1
              DLL Side-Loading
              LSASS Memory1
              Security Software Discovery
              Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
              Process Discovery
              SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
              System Information Discovery
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              tiago.exe24%ReversingLabsWin64.Hacktool.RevhellMarte
              tiago.exe100%AviraTR/Redcap.leocq
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No contacted domains info
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              194.190.152.129
              unknownRussian Federation
              41615RSHB-ASRUfalse
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1390958
              Start date and time:2024-02-12 17:32:06 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 4m 54s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:16
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:tiago.exe
              Detection:MAL
              Classification:mal64.troj.winEXE@2/1@0/1
              EGA Information:Failed
              HCA Information:Failed
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
              • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
              • Execution Graph export aborted for target tiago.exe, PID 6804 because there are no executed function
              • HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
              • Not all processes where analyzed, report is missing behavior information
              • VT rate limit hit for: tiago.exe
              No simulations
              No context
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              RSHB-ASRU0EZ9Ho3Ruc.exeGet hashmaliciousRedLineBrowse
              • 194.190.152.148
              Paralysis Hack.exeGet hashmaliciouszgRATBrowse
              • 194.190.153.137
              file.exeGet hashmalicious000StealerBrowse
              • 194.190.152.193
              EgNIXduB6T.exeGet hashmaliciousErbium StealerBrowse
              • 194.190.152.194
              2MNB4UhUqR.exeGet hashmaliciousRedLineBrowse
              • 194.190.152.20
              w9d568i4Ia.exeGet hashmaliciousDCRatBrowse
              • 194.190.152.128
              3pqdFTqin9.exeGet hashmaliciousDCRatBrowse
              • 194.190.152.128
              nJX6vEzSO5.exeGet hashmaliciousRedLineBrowse
              • 194.190.153.31
              X3JoqrBG6b.dllGet hashmaliciousAmadeyBrowse
              • 194.190.152.209
              Hlf35fELn8.exeGet hashmaliciousAmadeyBrowse
              • 194.190.152.209
              No context
              No context
              Process:C:\Users\user\Desktop\tiago.exe
              File Type:GLS_BINARY_LSB_FIRST
              Category:dropped
              Size (bytes):160
              Entropy (8bit):4.438743916256937
              Encrypted:false
              SSDEEP:3:rmHfvtH//STGlA1yqGlYUGk+ldyHGlgZty:rmHcKtGFlqty
              MD5:E467C82627F5E1524FDB4415AF19FC73
              SHA1:B86E3AA40E9FBED0494375A702EABAF1F2E56F8E
              SHA-256:116CD35961A2345CE210751D677600AADA539A66F046811FA70E1093E01F2540
              SHA-512:2A969893CC713D6388FDC768C009055BE1B35301A811A7E313D1AEEC1F75C88CCDDCD8308017A852093B1310811E90B9DA76B6330AACCF5982437D84F553183A
              Malicious:false
              Reputation:moderate, very likely benign file
              Preview:................................xW4.4.....#Eg.......]..........+.H`........xW4.4.....#Eg......3.qq..7I......6........xW4.4.....#Eg......,..l..@E............
              File type:PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
              Entropy (8bit):6.150692148279526
              TrID:
              • Win64 Executable (generic) (12005/4) 74.95%
              • Generic Win/DOS Executable (2004/3) 12.51%
              • DOS Executable Generic (2002/1) 12.50%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
              File name:tiago.exe
              File size:11'424'768 bytes
              MD5:41b99b0770f01afbd80481fb6f811bcc
              SHA1:58ee2fb1672b3af2db7997bb91cf3ab138d801e1
              SHA256:d457b15dfcdd6669d60af6d96f56757674b6f0fbba11999f76f47e03bd635d09
              SHA512:f9642a06e797992423b3d93785d175b081637b691c41d3f4a35dfd2860aa83cb967c4ceeace86a61e524f1ef674d1af1fab1de8e82ca45b11254cb666b78b08e
              SSDEEP:98304:BFS5S20uKttNYdJpKEiZGZBRA5RAWktxhI:B8qLSpXiI/C5CbhI
              TLSH:71B64A47F95045A8C0BAD134C6664262BB727C4A4B3077D72B50F7B82F73BE4AA7A350
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d........R........".......<..........w........@...........................................`... ............................
              Icon Hash:00928e8e8686b000
              Entrypoint:0x4677a0
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows cui
              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:6
              OS Version Minor:1
              File Version Major:6
              File Version Minor:1
              Subsystem Version Major:6
              Subsystem Version Minor:1
              Import Hash:f0ea7b7844bbc5bfa9bb32efdcea957c
              Instruction
              jmp 00007FFA80E63EA0h
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              pushfd
              cld
              dec eax
              sub esp, 000000E0h
              dec eax
              mov dword ptr [esp], edi
              dec eax
              mov dword ptr [esp+08h], esi
              dec eax
              mov dword ptr [esp+10h], ebp
              dec eax
              mov dword ptr [esp+18h], ebx
              dec esp
              mov dword ptr [esp+20h], esp
              dec esp
              mov dword ptr [esp+28h], ebp
              dec esp
              mov dword ptr [esp+30h], esi
              dec esp
              mov dword ptr [esp+38h], edi
              movups dqword ptr [esp+40h], xmm6
              movups dqword ptr [esp+50h], xmm7
              inc esp
              movups dqword ptr [esp+60h], xmm0
              inc esp
              movups dqword ptr [esp+70h], xmm1
              inc esp
              movups dqword ptr [esp+00000080h], xmm2
              inc esp
              movups dqword ptr [esp+00000090h], xmm3
              inc esp
              movups dqword ptr [esp+000000A0h], xmm4
              inc esp
              movups dqword ptr [esp+000000B0h], xmm5
              inc esp
              movups dqword ptr [esp+000000C0h], xmm6
              inc esp
              movups dqword ptr [esp+000000D0h], xmm7
              dec eax
              sub esp, 30h
              dec ecx
              mov ebp, ecx
              dec ecx
              mov edi, eax
              dec eax
              mov edx, dword ptr [00AC2F3Bh]
              dec eax
              mov edx, dword ptr [edx]
              dec eax
              cmp edx, 00000000h
              jne 00007FFA80E67B0Eh
              dec eax
              mov eax, 00000000h
              jmp 00007FFA80E67BD3h
              dec eax
              mov edx, dword ptr [edx]
              dec eax
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0xb390000x490.idata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0xb3a0000x143c8.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0xa936200x148.data
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x3cc91b0x3cca006f6399710d8e73bb4d97595fdbf2c895unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rdata0x3ce0000x6c46900x6c480063a7bf6fc3ecd59bb5a5e7001a3d6669unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .data0xa930000xa5c900x3f00054561056e6fe60f41c2f702be9d3398dFalse0.41117931547619047data5.234257557198867IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .idata0xb390000x4900x600595e8ed1d9e0ecb6593a211ad55f6ce0False0.3372395833333333data3.6155714884176935IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .reloc0xb3a0000x143c80x1440076a4bf18422ef148f168c11482b6a453False0.22239101080246915data5.439601861168321IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              .symtab0xb4f0000x40x20007b5472d347d42780469fb2654b7fc54False0.02734375data0.020393135236084953IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              DLLImport
              kernel32.dllWriteFile, WriteConsoleW, WaitForMultipleObjects, WaitForSingleObject, VirtualQuery, VirtualFree, VirtualAlloc, TlsAlloc, SwitchToThread, SuspendThread, SetWaitableTimer, SetUnhandledExceptionFilter, SetProcessPriorityBoost, SetEvent, SetErrorMode, SetConsoleCtrlHandler, ResumeThread, PostQueuedCompletionStatus, LoadLibraryA, LoadLibraryW, SetThreadContext, GetThreadContext, GetSystemInfo, GetSystemDirectoryA, GetStdHandle, GetQueuedCompletionStatusEx, GetProcessAffinityMask, GetProcAddress, GetEnvironmentStringsW, GetConsoleMode, FreeEnvironmentStringsW, ExitProcess, DuplicateHandle, CreateWaitableTimerExW, CreateThread, CreateIoCompletionPort, CreateFileA, CreateEventA, CloseHandle, AddVectoredExceptionHandler
              TimestampSource PortDest PortSource IPDest IP
              Feb 12, 2024 17:32:59.850532055 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:33:00.088032007 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:00.088325024 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:33:00.088802099 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:33:00.326031923 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:00.326086998 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:00.326548100 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:00.326765060 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:33:00.327115059 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:33:00.327133894 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:33:00.564398050 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:00.565198898 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:00.565217972 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:00.565233946 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:00.565314054 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:33:00.565882921 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:33:00.566060066 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:33:00.803311110 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:00.803352118 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:00.807303905 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:33:01.045042992 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:01.045305014 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:33:01.283900976 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:01.284311056 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:33:01.523307085 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:01.523700953 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:01.523780107 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:33:01.523948908 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:33:01.804080963 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:06.761651039 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:06.761912107 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:33:06.999236107 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:11.999667883 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:12.000025988 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:33:12.237319946 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:17.237936974 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:17.240813971 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:33:17.478126049 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:22.479029894 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:22.479430914 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:33:22.716727972 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:27.717403889 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:27.717801094 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:33:27.956814051 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:32.956219912 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:32.956302881 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:33:32.956500053 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:32.956706047 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:33:33.193846941 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:38.195077896 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:38.195425987 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:33:38.433078051 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:43.434425116 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:43.435403109 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:33:43.673126936 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:48.673547029 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:48.673903942 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:33:48.911345959 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:53.911984921 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:53.912009954 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:53.912098885 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:33:53.912359953 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:33:54.149949074 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:59.150465965 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:33:59.150665998 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:33:59.387840986 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:34:04.388051033 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:34:04.388103962 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:34:04.388485909 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:34:04.388730049 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:34:04.626533031 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:34:09.627732038 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:34:09.628041029 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:34:09.865379095 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:34:14.867907047 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:34:14.868135929 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:34:15.105669975 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:34:20.106281996 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:34:20.106539965 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:34:20.343950033 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:34:25.344005108 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:34:25.344063997 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:34:25.344367027 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:34:25.344609976 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:34:25.582134008 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:34:30.583266973 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:34:30.583574057 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:34:30.820888996 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:34:35.822144032 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:34:35.822630882 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:34:36.059968948 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:34:41.061084986 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:34:41.061403990 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:34:41.298902988 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:34:46.299810886 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:34:46.299895048 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:34:46.299981117 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:34:46.300414085 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:34:46.537925005 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:34:51.541538954 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:34:51.562390089 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:34:51.800179005 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:34:56.799938917 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:34:56.800009966 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:34:56.801222086 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:34:56.801460981 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:34:57.038727045 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:35:02.039608002 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:35:02.039925098 CET4970180192.168.2.7194.190.152.129
              Feb 12, 2024 17:35:02.277180910 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:35:07.278373957 CET8049701194.190.152.129192.168.2.7
              Feb 12, 2024 17:35:07.321909904 CET4970180192.168.2.7194.190.152.129
              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              0192.168.2.749701194.190.152.129806804C:\Users\user\Desktop\tiago.exe
              TimestampBytes transferredDirectionData
              Feb 12, 2024 17:33:00.088802099 CET26OUTData Raw: 53 53 48 2d 76 32 2e 33 2e 31 2d 77 69 6e 64 6f 77 73 5f 61 6d 64 36 34 0d 0a
              Data Ascii: SSH-v2.3.1-windows_amd64
              Feb 12, 2024 17:33:00.326086998 CET21INData Raw: 53 53 48 2d 32 2e 30 2d 4f 70 65 6e 53 53 48 5f 38 2e 30 0d 0a
              Data Ascii: SSH-2.0-OpenSSH_8.0
              Feb 12, 2024 17:33:00.326548100 CET608INData Raw: 00 00 02 5c 0d 14 1a fd a0 0b e2 c5 cf e7 e2 ec 3d cd 03 cd 89 99 00 00 00 a1 63 75 72 76 65 32 35 35 31 39 2d 73 68 61 32 35 36 2c 63 75 72 76 65 32 35 35 31 39 2d 73 68 61 32 35 36 40 6c 69 62 73 73 68 2e 6f 72 67 2c 65 63 64 68 2d 73 68 61 32
              Data Ascii: \=curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1ssh-ed25519laes128-gcm@openssh.com,aes256-gcm@ope
              Feb 12, 2024 17:33:00.327115059 CET1008OUTData Raw: 00 00 03 ec 12 14 2f 2b 49 d8 79 ca e2 23 81 38 83 08 e1 82 55 9e 00 00 00 ac 63 75 72 76 65 32 35 35 31 39 2d 73 68 61 32 35 36 2c 63 75 72 76 65 32 35 35 31 39 2d 73 68 61 32 35 36 40 6c 69 62 73 73 68 2e 6f 72 67 2c 65 63 64 68 2d 73 68 61 32
              Data Ascii: /+Iy#8Ucurve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-crsa-sha2-512-cert-v01@openssh.com,rsa-sha
              Feb 12, 2024 17:33:00.327133894 CET48OUTData Raw: 00 00 00 2c 06 1e 00 00 00 20 a6 c5 22 7d 99 91 ad 9e bd 0b c1 e7 ca 3b 64 5a d9 65 2c 66 6d be 7a 19 10 9d f6 4e 03 0b 03 07 3d 78 d4 fb 23 47
              Data Ascii: , "};dZe,fmzN=x#G
              Feb 12, 2024 17:33:00.565198898 CET192INData Raw: 00 00 00 bc 08 1f 00 00 00 33 00 00 00 0b 73 73 68 2d 65 64 32 35 35 31 39 00 00 00 20 d3 a5 7f f2 29 d7 53 21 71 56 81 ee c6 56 6c 11 6b f7 fd 68 7b b1 48 cc d6 f0 b1 d8 98 44 10 21 00 00 00 20 b2 8b 02 ee 6a 44 ea 59 ef 84 76 a7 2d d2 3a 1a 91
              Data Ascii: 3ssh-ed25519 )S!qVVlkh{HD! jDYv-:q^zdPSssh-ed25519@9JqbZBTL6E>&&>|H*fPMRP)1qX&N
              Feb 12, 2024 17:33:00.565217972 CET16INData Raw: 00 00 00 0c 0a 15 cb 6c 78 ea 3e cc ae 9b f3 d6
              Data Ascii: lx>
              Feb 12, 2024 17:33:00.565233946 CET228INData Raw: 00 00 00 d0 f8 3f 92 ba a3 91 7e 45 12 98 3d 18 8c 1f b8 10 01 67 b4 74 83 fe be 8a 33 d6 5c f8 4d c2 d7 a1 19 0c d1 69 7a 35 6a 02 23 ba ad 0a c8 38 5a 41 f4 b7 02 41 c1 de 12 d2 e3 80 47 9d 83 a8 d4 4f 7d a8 ff d2 f4 5f e3 c9 ed b6 c5 69 ad 08
              Data Ascii: ?~E=gt3\Miz5j#8ZAAGO}_ih/@lrPq3:] Xmd_Y=VD_q<\FS5ZqMZa^G`Ayp~x7WoDQ=%=V1?Nb&k A&-R
              Feb 12, 2024 17:33:00.565882921 CET16OUTData Raw: 00 00 00 0c 0a 15 3e 58 a0 07 8b 7c ea 25 25 9a
              Data Ascii: >X|%%
              Feb 12, 2024 17:33:00.566060066 CET52OUTData Raw: 00 00 00 20 3c 3b 69 72 20 73 2f 58 e9 6e 20 eb 52 9d 38 2a 52 dd e4 3e 85 10 74 f9 f0 bc f4 63 8a d5 33 e3 70 2f d2 23 4a 73 3b 03 eb 6f bf 1f c7 59 16 bd
              Data Ascii: <;ir s/Xn R8*R>tc3p/#Js;oY


              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Click to jump to process

              Target ID:0
              Start time:17:32:58
              Start date:12/02/2024
              Path:C:\Users\user\Desktop\tiago.exe
              Wow64 process (32bit):false
              Commandline:C:\Users\user\Desktop\tiago.exe
              Imagebase:0x560000
              File size:11'424'768 bytes
              MD5 hash:41B99B0770F01AFBD80481FB6F811BCC
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:Go lang
              Yara matches:
              • Rule: JoeSecurity_ReverseSSH, Description: Yara detected Outlook Reverse SSH, Source: 00000000.00000000.1237510418.0000000000D7A000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
              • Rule: JoeSecurity_ReverseSSH, Description: Yara detected Outlook Reverse SSH, Source: 00000000.00000002.2489434623.0000000000D7A000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
              Reputation:low
              Has exited:false

              Target ID:2
              Start time:17:32:58
              Start date:12/02/2024
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff75da10000
              File size:862'208 bytes
              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              No disassembly